SlideShare a Scribd company logo
1 of 23
Presented By : Shibani Sarangi
IT Branch, Regd no. 1001289324
Guided By : Prof. X
1
2
3
4
Plaintext: Data that can be read and understood
without any special measures.
Encryption: The method of disguising plaintext in
such a way as to hide its substance is called encryption.
Cipher text: Encrypting plaintext results in
unreadable gibberish called cipher text.
Decryption: The process of reverting cipher text to
its original plaintext is called decryption.
Key: some secret piece of information that
customizes how the cipher text is produced.
5
Cryptanalysis: The art of breaking ciphers, i.e.
retrieving the plaintext without knowing the proper
key.
Cryptographers: People who do cryptography
Cryptanalysts: Practitioners of cryptanalysis.
Cryptology: The branch of mathematics that studies
the mathematical foundations of cryptographic
methods.
Cipher: The Encoder, i.e., the encryption/decryption
scheme
6
7
For “secret writing”
To establish a shared secret when other people
(eavesdroppers) are listening.
Mainly classified into two types :
 Symmetric key cryptography
 Asymmetric key cryptography
8
encoder
decoder
(plaintext in -
ciphertext out)
ciphertextciphertext
msgmsg
(ciphertext in
- plaintext out)
(should understand
nothingnothing about the msg)
eavesdropper
bla-blabla-bla
cmbcmb--cmbcmb bla-blabla-bla
Cipher
msg
Plain text – in
Cipher text - out
Should understand NOTHING
about the message
Cipher text – in
Plain text - out
Cryptography
Symmetric key Asymmetric key
cryptography cryptography
(Public key cryptography)
Classical Modern
cryptography cryptography
Transposition Substitution Stream Block
cipher cipher cipher cipher
9
BOTH SHOULD
KNOWTHE KEY
10
11
In classical cryptography, a transposition
cipher changes one character from the
plaintext to another i.e. the order of the
characters is changed.
12
Substitution cipher is a method of
encryption by which units of plaintext are
substituted with ciphertext according to a
regular system.
13
A Stream Cipher is a symmetric or secret-
key encryption algorithm that encrypts a
single bit at a time. With a Stream Cipher, the
same plaintext bit or byte will encrypt to a
different bit or byte every time it is encrypted.
e.g. :
Plain text: Pay 100
Binary of plain text: 010111101
(hypothetical)
Key: 100101011 -----
Perform XOR
____________________
Cipher text 110010110 -----
14
Block cipher technique involves encryption
of one block of text at a time .Decryption also
takes one block of encrypted text at a time.
Length of the block is usually 64 or 128 bits.
e.g. :
Plain text: four and five
Four and five
Key Key Key
wvfa ast wvfa ---
15
Public key cryptography is an asymmetric
scheme that uses a Pair of keys for
encryption: a Public key, which encrypts data,
and a corresponding Private key (secret key)
for decryption.
16
Cryptanalysis refers to the study of
ciphers, cipher text, or cryptosystems (that
is, to secret code systems) with a view to
finding weaknesses in them that will permit
retrieval of the plain text from the cipher
text, without necessarily knowing
the key or the algorithm. This is known
as breaking the cipher, cipher text, or
cryptosystem.
Unlike cryptography which is a clearly
17
Known - plain text analysis
Chosen – plain text analysis (Differential
cryptanalysis)
Cipher text - only analysis
Man – in – the - middle attack
18
It is a side channel attack which exploits
sounds emitted by computers or machines.
Modern acoustic cryptanalysis mostly focuses
on sounds emitted by computer keyboards and
internal computer components
Historically it has also been applied to impact
printers and electromechanical cipher machines.
19
Use rubber keyboard or virtual keyboards
to prevent keystroke sounds.
Use acoustic printers.
Use Acoustic case for CPU.
20
Cryptography, being an art of encrypting
and decrypting confidential information and
private messages, should be implemented in
the network security to prevent any leakage
and threat.
It can be done by using any of these
techniques discussed above for fortifying the
personal data transmission as well as for
secure transaction.
Acoustic cryptanalysis, being an art of
Yang, Sarah (14 September
2005), "Researchers recover typed text using
audio recording of keystrokes", UC Berkeley
News.
http://en.wikipedia.org/wiki/Cryptography
https://www.coursera.org/course/crypto
21
22
23

More Related Content

What's hot

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Introduction to Cryptography Part I
Introduction to Cryptography Part IIntroduction to Cryptography Part I
Introduction to Cryptography Part I
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
My cryptography
My cryptographyMy cryptography
My cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Cryptanalysis and Attacks
Cryptanalysis and AttacksCryptanalysis and Attacks
Cryptanalysis and Attacks
 
cryptography
cryptographycryptography
cryptography
 
Itt project
Itt projectItt project
Itt project
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography 1
Cryptography 1Cryptography 1
Cryptography 1
 
Cryptography saurabh
Cryptography saurabhCryptography saurabh
Cryptography saurabh
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 

Similar to Cryptography 130919084510-phpapp02

Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
phanleson
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
ismaelhaider
 
Cryptography
CryptographyCryptography
Cryptography
Rohan04
 

Similar to Cryptography 130919084510-phpapp02 (20)

Cryptography
CryptographyCryptography
Cryptography
 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
 
Data encryption
Data encryptionData encryption
Data encryption
 
Day5
Day5Day5
Day5
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Cryptography (raza hassan)
Cryptography (raza hassan)Cryptography (raza hassan)
Cryptography (raza hassan)
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
 
Cryptography
CryptographyCryptography
Cryptography
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodel
 

Recently uploaded

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 

Cryptography 130919084510-phpapp02

  • 1. Presented By : Shibani Sarangi IT Branch, Regd no. 1001289324 Guided By : Prof. X 1
  • 2. 2
  • 3. 3
  • 4. 4 Plaintext: Data that can be read and understood without any special measures. Encryption: The method of disguising plaintext in such a way as to hide its substance is called encryption. Cipher text: Encrypting plaintext results in unreadable gibberish called cipher text. Decryption: The process of reverting cipher text to its original plaintext is called decryption. Key: some secret piece of information that customizes how the cipher text is produced.
  • 5. 5 Cryptanalysis: The art of breaking ciphers, i.e. retrieving the plaintext without knowing the proper key. Cryptographers: People who do cryptography Cryptanalysts: Practitioners of cryptanalysis. Cryptology: The branch of mathematics that studies the mathematical foundations of cryptographic methods. Cipher: The Encoder, i.e., the encryption/decryption scheme
  • 6. 6
  • 7. 7 For “secret writing” To establish a shared secret when other people (eavesdroppers) are listening. Mainly classified into two types :  Symmetric key cryptography  Asymmetric key cryptography
  • 8. 8 encoder decoder (plaintext in - ciphertext out) ciphertextciphertext msgmsg (ciphertext in - plaintext out) (should understand nothingnothing about the msg) eavesdropper bla-blabla-bla cmbcmb--cmbcmb bla-blabla-bla Cipher msg Plain text – in Cipher text - out Should understand NOTHING about the message Cipher text – in Plain text - out
  • 9. Cryptography Symmetric key Asymmetric key cryptography cryptography (Public key cryptography) Classical Modern cryptography cryptography Transposition Substitution Stream Block cipher cipher cipher cipher 9
  • 11. 11 In classical cryptography, a transposition cipher changes one character from the plaintext to another i.e. the order of the characters is changed.
  • 12. 12 Substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system.
  • 13. 13 A Stream Cipher is a symmetric or secret- key encryption algorithm that encrypts a single bit at a time. With a Stream Cipher, the same plaintext bit or byte will encrypt to a different bit or byte every time it is encrypted. e.g. : Plain text: Pay 100 Binary of plain text: 010111101 (hypothetical) Key: 100101011 ----- Perform XOR ____________________ Cipher text 110010110 -----
  • 14. 14 Block cipher technique involves encryption of one block of text at a time .Decryption also takes one block of encrypted text at a time. Length of the block is usually 64 or 128 bits. e.g. : Plain text: four and five Four and five Key Key Key wvfa ast wvfa ---
  • 15. 15 Public key cryptography is an asymmetric scheme that uses a Pair of keys for encryption: a Public key, which encrypts data, and a corresponding Private key (secret key) for decryption.
  • 16. 16 Cryptanalysis refers to the study of ciphers, cipher text, or cryptosystems (that is, to secret code systems) with a view to finding weaknesses in them that will permit retrieval of the plain text from the cipher text, without necessarily knowing the key or the algorithm. This is known as breaking the cipher, cipher text, or cryptosystem. Unlike cryptography which is a clearly
  • 17. 17 Known - plain text analysis Chosen – plain text analysis (Differential cryptanalysis) Cipher text - only analysis Man – in – the - middle attack
  • 18. 18 It is a side channel attack which exploits sounds emitted by computers or machines. Modern acoustic cryptanalysis mostly focuses on sounds emitted by computer keyboards and internal computer components Historically it has also been applied to impact printers and electromechanical cipher machines.
  • 19. 19 Use rubber keyboard or virtual keyboards to prevent keystroke sounds. Use acoustic printers. Use Acoustic case for CPU.
  • 20. 20 Cryptography, being an art of encrypting and decrypting confidential information and private messages, should be implemented in the network security to prevent any leakage and threat. It can be done by using any of these techniques discussed above for fortifying the personal data transmission as well as for secure transaction. Acoustic cryptanalysis, being an art of
  • 21. Yang, Sarah (14 September 2005), "Researchers recover typed text using audio recording of keystrokes", UC Berkeley News. http://en.wikipedia.org/wiki/Cryptography https://www.coursera.org/course/crypto 21
  • 22. 22
  • 23. 23